CN106465412A - Tentative grant for efficient device to device communications - Google Patents

Tentative grant for efficient device to device communications Download PDF

Info

Publication number
CN106465412A
CN106465412A CN201580018692.5A CN201580018692A CN106465412A CN 106465412 A CN106465412 A CN 106465412A CN 201580018692 A CN201580018692 A CN 201580018692A CN 106465412 A CN106465412 A CN 106465412A
Authority
CN
China
Prior art keywords
sender
priority
incompatible
transmission
bandwidth authorizing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201580018692.5A
Other languages
Chinese (zh)
Other versions
CN106465412B (en
Inventor
U·库马尔
李庆华
牛华宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apple Inc
Intel Corp
Original Assignee
Intel IP Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel IP Corp filed Critical Intel IP Corp
Publication of CN106465412A publication Critical patent/CN106465412A/en
Application granted granted Critical
Publication of CN106465412B publication Critical patent/CN106465412B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • H04W72/566Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/56Allocation or scheduling criteria for wireless resources based on priority criteria
    • H04W72/566Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient
    • H04W72/569Allocation or scheduling criteria for wireless resources based on priority criteria of the information or information source or recipient of the traffic information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/542Allocation or scheduling criteria for wireless resources based on quality criteria using measured or perceived quality

Abstract

Technology for efficient distributed scheduling is provided using tentative grants. A UE can receive a transmission request from a Tx UE, and from additional Tx UEs. Each Tx request can include a priority level of the transmitter UE sending the transmission request, to form a priority list. An incompatible list can be formed based on a signal to interference ratio of each transmitter with the UE. A grant message and the incompatible list can be transmitted for n 1 iterations from selected UEs based on the priority list and incompatible list. A tentative bandwidth grant can then be transmitted at an nth iteration to tentatively allow the transmitter UE to send a D2D communication to the UE in the bandwidth grant.

Description

The exploration mandate that effectively device-to-device communicates
Background technology
Device-to-device (D2D) communicates, by make between movement station can direction communication, can be used for dynamically increasing honeybee Data rate in nest wireless network and power system capacity.The various application and service based on adjacency can be configured with D2D operates.The D2D communication of unicast is expected to play an important role in the next generation communication system.Increasing with user density Plus, the problem of scheduling and interference management is very challenging.Lack for management using D2D operation equipment room contention and During the centralized device of scheduling, this problem becomes more challenging.
Brief description
The features and advantages of the present invention by from the detailed description below in conjunction with accompanying drawing it is clear that its in an illustrative manner Jointly describe the feature of the present invention, wherein:
Fig. 1 is the schematic diagram describing wireless communication system and environment according to examples disclosed herein.
Fig. 2 is the schematic diagram according to examples disclosed herein description logic business time-slot.
Fig. 3 is the schematic diagram describing channel contention according to examples disclosed herein.
Fig. 4 is the schematic block diagram of an embodiment describing mobile communication equipment according to examples disclosed herein.
Fig. 5 is the schematic diagram of description channel contention.
Fig. 6 is the schematic diagram of an embodiment describing efficient channel contention according to examples disclosed herein.
Fig. 7 is the schematic block diagram describing priority list according to examples disclosed herein.
Fig. 8 is according to examples disclosed herein, and description is configured to the user device function that device-to-device (D2D) communicates Flow chart.
Fig. 9 is the flow process describing distributed scheduling method in device-to-device (D2D) network according to examples disclosed herein Figure.
Figure 10 is to be described according to examples disclosed herein to provide distributed scheduling feature in device-to-device (D2D) network Flow chart.
Figure 11 is the schematic diagram of the wireless device (such as UE) according to an example.
The exemplary embodiment describing will be illustrated, be used herein as specific language to describe identical content.No Cross it should be appreciated that it does not constitute any limitation on the scope of the present invention.
Specific embodiment
Before the present invention is disclosed and described it will be appreciated that the invention is not restricted to specific structure, program step or Material disclosed herein, but, the present invention extends to the equivalent of person of ordinary skill in the relevant's understanding.It should be appreciated that The term herein applied is used for describing the purpose of specific example, is not intended to limit.Same reference number in different accompanying drawings Represent same element.The accompanying drawing providing in flow chart and program is provided in and steps and operations is explicitly described, and not necessarily must The specific order of instruction or sequence.
Exemplary embodiment
The initial general introduction of technical em- bodiments is provided below, subsequently describes particular technology embodiment in detail.This initial summary is anticipated Reader to be helped quickly understands technology it is therefore intended that the key feature for identification technology or key character, is also not intended to limit Make the scope of theme required for protection.
As can be seen that increasing with user density, distributed scheduling becomes optimum.Running into centralized scheduling entity, For example during enode b (eNB) idle emergency, this distributed scheduling is equally also very useful.However, distributed tune The use of degree can utilize substantial amounts of expense, particularly in the system with high density user.For example, in traditional contention mechanism In, it is referred to as FlahLinQ, for N number of bandwidth authorizing, it is with least 2N block or section come scheduling bandwidth mandate.Become very with N Greatly, expense may become excessive.
According to an embodiment, distributed scheduling scheme can be used, and which considerably reduces amount of overhead, and allows The D2D link of low priority can be scheduled with high priority D2D link simultaneously, and controls to high-priority users link Interference.Because iterationses increase, more D2D links can be scheduled, and causes more high spatial huge profit to be used and higher throughput. Realizing the handling capacity close with the upper limit needs substantial amounts of iteration, and this causes the cost of high expense.However, by using relatively low preferential The exploration mandate of level link, can realize the handling capacity close to the upper limit under the iteration of relatively low number of times.This is by following section Discussed further in falling.
Wireless mobile telecommunication technology sends data using various standards and agreement between base station and Wireless Telecom Equipment. Wireless communication system standards and agreement can include, for example third generation affiliate engineering (3GPP) Long Term Evolution (LTE);Electrically With EEA Eelectronic Eengineering Association (IEEE) 802.16 standard, i.e. worldwide interoperability for microwave accesses known to industrial organization (WiMAX);And IEEE 802.11 standards, i.e. Wi-Fi known to industrial organization.In the 3GPP Radio Access Network (RAN) according to LTE, base station is called Make E-UTRAN (E-UTRAN) node B (be equally generally marked as evolution NodeB, eNodeB, Or eNB).It can be communicated with the Wireless Telecom Equipment being referred to as user equipment (UE).Although open the presented art of the present invention Language and example are generally directed to 3GPP system and standard, but teaching disclosed herein can apply to any kind of wireless network or Communication standard.
Fig. 1 is the schematic diagram of description communication system 100, and communication system 100 includes multiple communicating with network infrastructure 104 UE 102.Network infrastructure 104 includes evolution block core (EPC) 106 and E-UTRAN 108.EPC 106 includes moving Management entity (MME) and gateway (S-GW) 112, they are passed through S1 interface and are led to the eNodeB 110 in E-UTRAN 108 Letter.The S1 interface of 3GPP definition supports EPC 106 and the direct many-to-many relationship of eNodeB 110.For example, different operator Same eNodeB 110 (this is referred to as " network share ") can be operated simultaneously.E-UTRAN 108 is for LTE (i.e. 3.9G) With the packet switch 3GPP RAN of LTE-Advanced (i.e. 4G), introduce for the first time in 3GPP version 8 and continue evolution.? In E-UTRAN 108, eNodeB 110 is than general land wireless access used in Universal Mobile Telecommunications System (UMTS or 3G) Conventional node B of network (UTRAN) is more intelligent.For example, the function of nearly all radio network controller (RNC) has been moved to In eNodeB, rather than in single RNC.In LTE, interconnected by X2 interface between eNodeB 110, this makes ENodeB 110 can forward or share information.
UE 102 is communicated with eNodeB 110 using the cellular frequency spectrum that Uu eats dishes without rice or wine to permit.UE 102 and eNodeB 110 that Can be with transmitting control data and/or user data between this.In LTE network descending (DL) transmission can be defined as from ENodeB 110 arrives the communication of UE 102, and up (UL) transmission can be defined as the communication from UE 102 to eNodeB 110.
Eated dishes without rice or wine direction communication by Ud from each other except by DL and UL of Uu interface transmission, also show UE 102.
In D2D communication, pass through Ud D2D interface as shown in Figure 1, UE 102 can directly be led to another one UE 102 Letter is it is not necessary to the route through eNodeB 110 or core net (such as EPC 106) communicates.D2D communicates due to can reduce core The load of heart net (such as EPC 106) or wireless access network (such as E-URTAN 108) is interesting, due to direct and short distance Communication path and increase data rate, public safety communication path is provided, and other functions is provided.D2D has been proposed to use Share in local social networkies, content, location-based market, service advertisement, movement-Mobile solution and the neighbouring clothes of other type Business (ProSe).
Various selections are had to realize such direct communication path between mobile device in principle.Implement at one In example, D2D eats dishes without rice or wine Ud can be by using short-range communication technique, and such as bluetooth or Wi-Fi are realized, or by huge profit honeycomb Licensed spectrum in communication system, such as 3GPP LTE or Wimax is realized.When through licensed spectrum communication, up (UL) frequently Spectrum is normally used for minimizing the interference between the relatively large downstream signal of the power communicating with eNodeB.
D2D communication may be generally divided into two parts.Part I is proximity detection (or equipment discovery), wherein UE 102 can determine them within the distance of D2D communication.Proximity detection can be assisted by network infrastructure 104, can be by UE 102 at least a portion execution, or network infrastructure 104 can be largely independent of and be performed.Part II It is direction communication, or D2D communication, between UE 102, this includes setting up the process of D2D session between UE 102 and reality User or applied data communications.Using licensed spectrum D2D communication may or be likely to not in Mobile Network Operator (MNO) under Sustainable Control.For example, UE 102 communicates it may not be necessary to have and eNodeB 110 between to participate in D2D Activation connects.
The basic problem of radio communication be reduce interference or management contention, in order to wireless device will not the same time/ Frequency is transmitted and is interfered.If the connection with RAN or core net is maintained, RAN or core net can be used for assist control UE Between communication to avoid interference.However, when concentrate coordinate infeasible when, distributed contention can be used for control channel access and Reduce or eliminate interference.For example, if the user while being operated outside the coverage of cellular network, or led to by D2D Coverage is walked out, the equipment of D2D configuration may need contention transmission time during letter.In view of the above, applicant realizes It is one of limiting factor of D2D communication to contention expense, and have shown that the efficiency needing to lift distributed contention.
In the distributed scheduling of transmission time, the wireless device of such as UE can be allocated unique priority value.So Priority can be used for determining the when allocated chance sending of each UE afterwards, thus reduces or eliminates striving of same transmission time With.In traditional scheduler mechanism, the FlashLinQ of such as high pass, transmission request needs to send repeatedly in successive ignition, to adjust Spend parallel D2D link, this link sharing has the same channel of high spatial huge profit.The FlashLinQ framework of high pass is disclosed in “FlashLinQ:A Synchronous Distributed Scheduler for Peer-to-Peer Ad-hoc Networks " (X.Wu, S.Tavildar, S.Shakkottai, T.Richardson, J.Li, R.Laroia, A.Jovicic, IEEE/ACM Transaction on Networking, in August, 2013).
In FlashLinQ, once the recipient of D2D link obtains link (having in all unscheduled links Highest priority), authorization messages are broadcasted all UE in the range of it by it, notify UE to authorize communication by its sender Channel.After receiving authorization, the recipient of unscheduled D 2D link (or even having limit priority) can not be by this channel authorization To its sender, because recipient does not know whether its sender can cause the unacceptable interference to schedule link. Recipient has to wait for its sender to check compatibility, and sends transmission request again or abandon competing.It is right to abandon The action of another D2D link competition is referred to as abandoning (surrender).
Applicants have noted that and be disclosed that system and method, wherein transmission request can be less by transmission Number of times, with schedule parallel D2D link, maintains a substantially optimum data throughout with respect to the theoretical upper limit.Implement at one In example, the recipient just obtaining channel can be configured to check for the compatibility of unscheduled transmission side, and in authorization messages middle finger Go out incompatible sender, thus create and strengthen authorization messages.After receiving enhancing authorization messages, there is high priority Unscheduled recipient can send authorization messages immediately it is not necessary to wait the additional request of corresponding sender.In an embodiment In, the authorization messages including incompatible sender instruction consume the as many resource with original authorization messages, and lead to strive Reduce 30-40% or more with expense with respect to traditional scheduler mechanism (for example existing FlashLinQ framework).
In one embodiment, teaching disclosed by the invention can serve as the improvement of existing FlashLinQ framework.At one In embodiment, teaching disclosed by the invention can serve as the contention mechanism of unique novelty, separates completely from FlashLinQ framework Or it is independent.Although give various related with FlashLinQ framework or compared with example, those skilled in the art will Recognize that the present invention is open and can be applicable to other frameworks or communication protocol.
In one embodiment, UE includes asking receiving unit, interference assembly and authorizes/refusal assembly.Request reception group Part is configured to send UE reception the first signal from first, and this first signal designation to the request of UE transmission, and will receive one Individual or multiple additional signals, indicate that one or more additional transmission UE just ask to be sent to corresponding target UE.Interference assembly base Identify one or more incompatible UE in the receiving power of the first signal and one or more additional signal.Incompatible UE includes At least one of one or more of additional transmission UE.Authorize/refuse assembly to be configured to send authorization signal, instruction is right The mandate of the first transmission UE, and instruction stops one or more incompatible UE transmission further.
Fig. 2 illustrates an embodiment of the logic business time slot 200 of discussion in FlashLinQ framework.Note that this The teaching that place provides can be used for changing FlashLinQ framework or can be used in completely self-contained framework.FlashLinQ framework Discuss and be only provided by way of explanation and background technology.In one embodiment, logic business time slot 200 includes resource Minimal segment, it can be dispatched by mobile terminal or UE.In the embodiment depicted, logic business time slot 200 may include multiple just Hand over frequency and a time span.For example, logic business time slot 200 can have the length of general 2 milliseconds (ms).During logic business Gap 200 is divided into multiple sections, dispatches section, rate scheduling end, data segment and confirmation (Ack) section including connecting.In an embodiment In, connect scheduling section and be used for dispatching the transmission of data segment, and be carried out and solve the place of channel contention.Rate scheduling section May include from the scheduled pilot tone (Pilot) of sender and indicate (CQI) from the channel quality of recipient.Data segment can During occurring including scheduled transmission or within time block and/or resource.Ack section sends during can be used for confirming data segment Being properly received of data.
In one embodiment, channel contention occurs during connecting scheduling section.For the sake of clear, it will thus provide connect scheduling and The simplicity of explanation of channel contention.Connect scheduling section and be divided into single block, including transmission request block (Tx- asks block) and bandwidth Granted block.Each block is shown as being divided into multiple units, is referred to as symbol or tone.In one embodiment, each symbol or Tone corresponds to a D2D link between D2D UE or UE.During Tx- request block, each wishes the D2D of transmission UE transmit power on its corresponding tone, the transmission request of instruction current logic business time-slot.During bandwidth authorizing block, The recipient UE of high priority D2D UE or D2D link is responded with mandate.This mandate may include corresponding to request D2D UE Tone on transmit power.In one embodiment, a series of optional Tx- request blocks and bandwidth authorizing block are (for example, see scheme 3, be discussed below) be performed, until all links being scheduled are scheduled.Speed during follow-up rate scheduling section is adjusted Data transfer during degree, data segment and the confirmation during Ack section are subsequently performed in logic business time slot 200.
Above embodiment is only provided in exemplary fashion.Further details and exemplary reality are discussed below Apply example.
Fig. 3 illustrates the method for channel contention, including conventional channel contention 302 (such as FlashLinQ) and enhancing Channel contention 304.Every kind of mechanism is all illustrated with a lot of blocks, and each block represents Tx- request block or bandwidth authorizing block.In some feelings Under condition, the different structure of Tx request and Rx request can be used.
In conventional channel contention 302, at least one Tx is had to ask for each bandwidth authorizing.For example, for N number of bandwidth Authorize, take at least 2N block or section.In strengthening channel contention 304, take N+1 block or section, please because needing only to a Tx Seek block.More than one Tx- is needed to ask block can send at least come the D2D UE to allow to be hopeful to transmit in some cases One transmission request.However, Tx- asks the quantity of block to remain the number of a fixation, and will be N+x, wherein N is to authorize Quantity, x is the quantity that Tx asks block, to allow each transmission Tx can send a Tx request.Therefore, as described, increase Strong channel contention 304 eliminates additional transmission asks and causes expense to greatly reduce.
Go to Fig. 4, the block diagram being configured to execute the UE 102 of efficient channel contention is illustrated.UE 102 includes asking assembly 402nd, ask receiving unit 404, priority component 406, disturb assembly 408, authorize/refuse assembly 410, authorize receiving unit 412nd, transceiver 414 and processor 416.The form that assembly 402-416 passes through example shows, and not included in all enforcements In example.In certain embodiments, only include the combination in any in, or two or more 402-416.In an embodiment In, UE 102 is configured to as sending UE or receiving UE work, as needed for D2D link or existing communication.
Request assembly 402 is configured to send a transmission request to target UE (or receiving UE).In one embodiment, Request assembly 402 has data to be sent to reciprocity UE by D2D link in response to determining UE 102, and sending a transmission please Ask.Request assembly 402 can be sent to reciprocity UE by D2D link by transmitting request in Tx- request block during connecting scheduling. In one embodiment, request assembly 402 can be by the tone of tone matrix, such as the Tx- of Fig. 2 asks the tone of block Upper transmit power is sending above-mentioned transmission request.In one embodiment, the other UE in the range of UE 102 can be in different tones On Tx- request block in send transmission request.Because can be distinguished between tone, it is related to the vicinity in D2D communication UE is possible to distinguish which UE sends in request.In one embodiment, request assembly 402 is configured to connect scheduling for each Or logic business time slot sends a transmission request.For example, during each business time-slot, only one transmission request need by Send to obtain or to produce channel.In one embodiment, UE 102 can wait during multiple bandwidth authorizing blocks or monitor, Ask without sending additional transmission.In one embodiment, request assembly 402 in optimum link power, for example, will be used In the power in link, to send transmission request.
Request receiving unit 404 is configured to receive the transmission request being sent by one or more equity UE.In a reality Apply in example, request receiving unit 404 receives transmission request from the reciprocity UE of the part carrying out D2D session with UE 102.For example, Request receiving unit 404 can receive the signal that the reciprocity UE of instruction will send data to UE 102.In one embodiment, request connects Receive assembly 404 and can receive transmission request from the UE being not connected with.For example, UE request nearby is connected to corresponding target UE, please Ask receiving unit 404 can receive these requests.Although neighbouring UE can request that is transferred to different UE, UE 102 can use this Individual information is used for channel contention.For example, UE 102 be able to determine whether to exist the higher priority not also being scheduled UE (or UE corresponding to higher priority D2D link).In one embodiment, the power that received or include in transmission request The power of other information, such as transmission, can use after being stored for.
Priority component 406 is configured to determine that UE 102 and/or the priority of one or more UE nearby.In a reality Apply in example, priority component 406 determines priority based on predetermined algorithm, so as the UE near other can determine same excellent First level.For example, the link between UE can distinguish order of priority, so that high priority link can be before low priority link Obtain channel.Low priority link (or the UE as a low priority link part) waits scheduling grant message until all The link of higher priority is scheduled, abandons or is prevented to transmit.In FlashLinQ, if low priority link predicts it Unacceptable interference will be caused to scheduled high priority link, this low priority link will abandon channel contention, that is, bend Clothes (yield;Abandon).
In an embodiment of the application, the priority of each UE can be determined based on predetermined algorithm, for example at random Number maker or public seed.For example, all UE know the priority of all other UE in the range of wireless proximity.Implement at one In example, UE is configured to determine that the priority (or priority of request UE) of its own link and sends out to other corresponding targets UE Send the priority of other UE of transmission request.In one embodiment, priority component 406 can determine which sound in tone matrix Adjust which UE (in such as Fig. 2, Tx- asks the tone in block and bandwidth authorizing block) corresponds to.In one embodiment, priority Assembly 406 can determine the priority of another UE or D2D link based on the tone for transmission request.
Identifying in the D2D transmission that interference assembly 408 is configured to occur at the same time to have causes the height of substantial interference can One or more UE of energy property.For example, interference assembly 408 can detect the receiving power of transmission request, and this transmits a request to certainly please Seek the source UE sending to UE 102, also detection has transmitted to other UE and belongs to other D2D chains in the range of UE wireless proximity The receiving power of the transmission request connecing.Once source UE and other transmission UE sent in the same time, through-put power or receiving power It is subsequently used in estimation signal-to-noise ratio (SIR).In one embodiment, during interference assembly 408 is based on Fig. 2 Tx- request block Send transmits a request to estimation SIR.In one embodiment, interference assembly 408 be storable in UE 102 obtain channel when that The instruction of one or more UE nearby of transmission should be stoped a bit.If nearby the sir value of UE is higher than selected threshold value and excellent First level is less than the priority of UE, and these neighbouring UE can be prevented from.
Authorize/refuse assembly 410 to be configured to send authorization signal, this authorization signal instruction source UE will be allowed in business Send in time slot.In one embodiment, to request UE, authorization signal indicates that it allows to send.Authorization signal can include tone Matrix, authorizes/refusal assembly 410 transmit power on the tone corresponding to the authorized UE allowing to send in this matrix. For example, authorization signal may include the power on one of in the tone of bandwidth authorizing block of Fig. 2.Corresponding UE can receive mandate Signal, and know that it has been authorized to license and has sent during the data segment of business time-slot.
In one embodiment, authorization signal can also include the one or more UE (or D2D link) being prevented from sending Instruction.For example, authorization signal may indicate that one or more UE that can disturb (being determined by interference assembly 408) are prevented from sending. Stop transmission from limiting other UE to send and cause to the interference authorizing UE or link.In one embodiment, authorization signal bag Include tone matrix, wherein authorize/refuse assembly 410 to be prevented from corresponding to or forbid sending work(on the tone of UE sending Rate.For example, authorization signal may include the one or more euphonic power of Fig. 2 bandwidth authorizing block, to indicate those UE by Stop.Thus, bandwidth authorizing block (or other authorization messages) can be used for a UE authorization channel, and refuse one or Multiple other UE send.In one embodiment, based on priority, other UE can determine which UE is authorized to or prevention.For example, The tone of the limit priority of transmit power is considered as to authorize thereon, and the tone of any low priority can be considered as resistance Stop or refusal sends.In one embodiment, different from each UE, there is a tone, tone matrix can be included at least Two tones (such as one authorizes tone and a refusal tone) of one UE.
In one embodiment, authorize/refuse assembly 410 is configured to whether authorization requests UE are linked into channel.Authorize/ Refusal assembly 410 can according to one or more priority, have authorize and/or stop instruction authorization messages and estimation channel SIR is determining whether authorization channel.In one embodiment, authorize/refusal assembly 410 can be based on having limit priority D2D link determines that channel should be authorized to.For example, if the D2D link or UE priority than all UE sending transmission request Height, authorizes/refuses assembly 410 to can determine that channel should be authorized to, and sends authorization messages (the one or more preventions of inclusion Instruction, refuses to send to one or more of the other UE).In one embodiment, if UE is not the request UE of limit priority, Authorize/refuse assembly 410 always according to previous authorization messages and to stop instruction from determining whether authorization channel.For example, if authorized Receive UE by another before message to send, authorize/refuse assembly 410 can consider that corresponding UE has been authorized to channel, and More authorization messages will not be sent.Similarly, authorize/refusal assembly 410 can determine which UE or link previously Do not allowed in authorization messages or refused.Based on authorizing and stoping instruction, mandate/refusal assembly 410 can determine that its D2D link (the prevention instruction being for example not received by channel) whether can also be authorized to, and with the presence or absence of also uncommitted or clear and definite Other higher priority UE of refusal channel.If there is no higher priority UE and not bright for corresponding D2D link Really refuse, authorize/refuse assembly 410 to can determine that it should send authorization messages.
In one embodiment, authorize/refusal assembly 410 can also according to transmission request and/or one or more The SIR to estimate channel for the authorization messages sending.For example, authorize/refuse assembly 410 can be determined according to all other transmission UE SIR is too high, and is rejected by channel.Similarly, authorize/refuse assembly 410 to can determine that SIR is in acceptable scope, and Send authorization messages, this authorization messages includes authorizing instruction, and may include one or more prevention instructions, for example, to having be higher than The prevention of the low priority UE of the SIR of selected threshold value.
In one embodiment, authorize/refuse assembly 410 to be configured to ask block based in one or more initial transmission The transmission request that period receives, to determine whether to authorize or refuse the transmission request from UE, in order to ask UE in business It is not required to send again their transmission request during the connection scheduling of gap.
For example, the first authorization messages can be sent by a UE, and the second authorization messages subsequently can be sent by the 2nd UE, without Any transmission request is sent between the first authorization messages and the second authorization messages.For example, one or more preliminary Tx- requests Block can be followed by continuous bandwidth authorizing block it is not necessary to any additional Tx- asks block.In one embodiment, mandate disappears Breath (or bandwidth authorizing block) is higher than one to one (1: 1) with the ratio of the request of each device transmission (or Tx- asks block).For example, single Individual Tx- request block may include multiple transmission requests.However, in one embodiment, the transmission request of each UE only one can quilt Send, because the transmission request repeating is unwanted.In one embodiment, the ratio of bandwidth authorizing block and Tx- request block Can be at least 3: 2, at least 2: 1, or higher.In one embodiment, the ratio of bandwidth authorizing block and Tx- request block can be 3: 1 or higher.
In one embodiment, authorize/refuse the power that assembly 410 can be differently configured from optimum link power to send mandate to disappear Breath (such as tone matrix), such as maximum transmission power or complete through-put power are to reach UE as much as possible and/or with maximum Change the probability that authorization messages are received.For example, send authorization messages in higher-wattage and contribute to guaranteeing connecing corresponding to transmission UE Receive UE and can receive authorization messages (or block instruction of any inclusion).In one embodiment, authorize/refusal assembly 410 Authorization messages can be sent in the power different from transmission request, such as than the high power of through-put power corresponding to transmission request.
In one embodiment, authorize/refusal assembly 410 can transmission in the case of not having any express authorization instruction Refuse information.For example, authorize/refuse assembly 410 can send refuse information, it indicates which link or UE and corresponding father UE Or link is incompatible.For example, the mandate of channel can be implied, so that there is no need clearly authorization channel.Because a lot Link is unavailable during granted block, and usually, in same granted block, only one link can be authorized to, clearly refusal and Hint mandate can lead to significantly more efficient channel contention.In one embodiment, under the fact that UE sends refuse information, The mandate of channel can be suggested to corresponding link UE and any other neighbouring UE.
Receiving unit 412 is authorized to receive authorization messages.Authorization messages may include mandate instruction and one or more preventions refer to Show, as discussed above.In one embodiment, authorization messages can store the related letter that use follow-up about authorization messages Breath.For example, this information may be used in determining whether to send authorization messages, and whether the request that UE sends on channel is rejected, Etc..In one embodiment, receiving unit 412 is authorized to be configured to during multiple continuous bandwidth authorizing blocks monitor mandate Message.For example, authorize receiving unit 412 can monitor authorization messages, send additional transmission request without UE 102.In a reality Apply in example, authorize receiving unit 412 can receive authorization messages, it indicates that one or more higher priority UE have been authorized to channel And/or refusal channel.In one embodiment, authorize receiving unit 412 according to authorization messages, determine father UE, corresponding UE or Whether D2D link has been rejected or authorization channel.
In one embodiment, authorization messages can be transmitted n iteration, and wherein n is positive, nonzero integer.Computing j= 1 ..., n-1 can run in previously described paragraph.For last iteration, j=n, sound out mandate and can be transmitted.If Meet the interference threshold to its own signal at recipient, such as signal interference value threshold value, previously have no chance in iteration to send out Send bandwidth authorizing all recipients can heuristically authorization channel, all bandwidth authorizing that sender subsequently receives according to it May determine whether to send.If higher priority link thinks that sender is incompatible, sender will not send.This will be below Paragraph in be described more fully.
Transceiver 414 may include antenna and the circuit for sending and receiving wireless signal.For example, transceiver 414 can wrap Include radio, be configured to run in license or unlicensed spectrum.In one embodiment, transceiver 414 can be configured to Based on one or more agreements, such as Bluetooth protocol, 3GPP agreement, Wi-Fi agreement, Wi-Max agreement or any other agreement are come Run.In one embodiment, transceiver 414 can send and receive other assembly 402-412 for UE 102 and 416 letter Number.
Processor 416 may include any general purpose or special processor.In one embodiment, at processor 416 The information that one or more of the other assembly 402-414 of reason UE 102 provides or stores.In one embodiment, one or more Other assembly 402-414 may include the code being stored in computer-readable medium, is executed by processor 416.
Fig. 5 is the schematic diagram that the traditional contention using such as FlashLinQ architecture and method is described.Fig. 5 illustrates in bag Include the cycle very first time 502, multiple times of the second time cycle 504, the 3rd time cycle 506 and the 4th time cycle 508 Communication in cycle, between multiple transmission equipment (Tx 1, Tx 2, Tx 3) and receiving device (Rx 1, Rx 2, Rx 3).One In individual embodiment, the cycle very first time 502 and the 3rd time cycle 506 correspond to Tx- and ask block, and now transmission request is sent out Send.In one embodiment, the second time cycle 504 and the 4th time cycle 508 correspond to bandwidth authorizing block, now authorize and disappear Breath is sent.Solid line represents the transmission being sent to equity by D2D link or connecting equipment, and dotted line represents that transmission can also quilt Equipment in addition to connection or chained device receives.
In Fig. 5, three link competition transmission:Link 1, it includes Tx 1 and Rx 1;Link 2, it includes Tx 2 and Rx 2; And link 3, it includes Tx 3 and Rx 3.Link 1 and link 3 can be with parallel runnings, because they are a good distance away and mutual Between interference very weak (i.e. SIR is very high).Link 2 can not be with link 1 or link 3 parallel running.Transmission from high to low is excellent First level is link 1, link 2 and the such order of link 3.In other words, if link 1 needs, then link 2 should be abandoned, And if link 2 needs, then link 3 should be abandoned.In the cycle very first time 502, sender Tx 1, Tx 2 and Tx 3 Send transmission request, indicate that they are wished in slot transmission current or on the horizon.Recipient Rx 1, Rx 2 and Rx 3 from Corresponding sender and the sender corresponding to other links receive request.Based on request, sender will award according to priority Power bandwidth (or channel).In the second time slot 504, Rx 1, it has highest priority, to Tx 1 authorization channel.By measurement The receiving power of authorization messages, Tx 2 knows that it will cause too many interference to Tx 1 if it is with Tx 1 transmitted in parallel.Cause This, Tx 2 abandons (surrendering), and does not send transmission request within the 3rd time cycle 506.Rx 1 based on measurement awards The receiving power of power message, because Tx 3 does not result in the strong interference to Rx 1, Tx 3 passed through within the 3rd time cycle 506 Transmission transmits a request to compete again.Finally, Rx 3 is Tx 3 authorization channel within the 4th time cycle 508.
Fig. 6 is the schematic diagram that enhancing contention disclosed herein or more efficient contention are described.As illustrated, including first In multiple time cycles of time cycle 602, the second time cycle 604 and the 3rd time cycle 606, multiple transmission equipment (Tx 1st, Tx 2, Tx 3) communicated and receiving device (Rx 1, Rx 2, Rx 3) between.In one embodiment, the week very first time Phase 602 corresponds to Tx- asks block, period sender UE, Tx 1, Tx 2 and Tx 3 to send transmission request.In one embodiment, Second time cycle 604 and the 3rd time cycle 606 correspond to the iteration of bandwidth authorizing block, and period authorization messages are sent.? In this example, when authorization messages are sent, there is the iteration of n=2 bandwidth granted block, wherein n is positive nonzero integer.Real Line represents the transmission being sent to equity by D2D link or connecting equipment, and dotted line represents that transmission can also be by except connection or chain The equipment beyond equipment that connects receives.
In one embodiment, new contention mechanism is different from traditional mechanism, wherein sender do not need one time another Participate in contention everywhere and (in same communication time slot, send multiple transmission requests).However, recipient can be configured to Converse directly with one another to determine which link can run simultaneously.As shown in fig. 6, sender Tx 1, Tx 2 and Tx 3 can be Transmission request is sent, similar to traditional contention mechanism in the cycle very first time 602.
Within the second time cycle 604, Rx 1 (having limit priority) is more than what traditional mechanism did.Especially, Rx 1 not only to its sender Tx 1 authorization channel, and the transmission of Tx to be stoped 2.Because Rx 1 can be by checking Tx's 2 The receiving power of transmission request can determine measuring the interference from Tx 2 (for example within the cycle very first time 602), Rx 1 Signal-to-noise ratio (SIR) is higher than the threshold value of selection, so that link 1 (between Rx 1 and Tx 1) and link 2 are (in Rx 2 And Tx 2 between) incompatible.Therefore, Rx 1 can stop Tx 2 proactively, replace and wait Tx 2 to check interference level and to put Abandon.Because this determination is completed by Rx 1, and occur in authorization messages, all of link (and recipient) both knows about Tx 2 is rejected.
In the 3rd time cycle 606 (i.e. n-2), since Rx 3 knows that Tx 2 is prevented by Rx 1, then Tx3 all not There is in scheduled link highest priority.If the interference from Tx 1 is less than threshold value, Rx 3 is to Tx 3 authorization channel So that link 1 and link 3 can be with parallel runnings.Therefore, new mechanism compares traditional mechanism, can make same amount of link more It is scheduled soon (within less time cycle).For example, the contention in Fig. 6 is faster by about 25% than the contention in Fig. 5.With chain Way amount increases, and percent speed increase can persistently be lifted.This will lead to be greatly saved control overhead.In some cases, hundred Point specific rate increase can exceed 30%, more than 40%, and/or close to 50%.
Fig. 7 provides the schematic diagram of the cell with 11 links.In this example, there are 11 potential chains between UE Road.Wish that the UE sending is referred to as sender UE.The UE communicating with sender UE is referred to as recipient UE.Each UE can be joined It is set to and can send and receive.
In the example of fig. 7, each in recipient UE 1,3,4,6,10 and 11 has been received by transmission request, and Priority level has been assigned.Each recipient UE knows the priority level of other recipient UE.In addition, passing according to sending The SIR level determining during defeated request, each UE also knows the potential interference that other UE can cause.Recipient UE is configured to basis The rule of Fig. 4 description, to their corresponding sender's UE transmission bandwidth authorization messages.Recipient 6 is configured to expectation and uses chain Road 1 is sending its bandwidth authorizing.In sending iteration, recipient 6 can receive recipient 3 and 4 by recipient 1 at it Bandwidth authorizing in the instruction that is prevented from, therefore, 6 can be transferred to before and transmission bandwidth request in sending iteration.
If sufficient amount of bandwidth authorizing is allowed to, then be up to the space encapsulation of relative compact in cell.So And, if iterationses very little (i.e. 1 to 2 iteration), this mechanism can not execute well.When Fig. 6 example compared to When the example of Fig. 5 decreases expense, additional improvement can be carried out to reduce expense further and to increase MPS process handling capacity With close to the theory upper limit.
Consider that iterationses are 1 situations (i.e. n=1).In priority list shown in Fig. 7, in bandwidth authorizing message First time iteration in, only link 1 be scheduled.Even if link 1 closes link 3 and 4, know this information to link 6 When, the bandwidth authorizing stage finishes.This is real situation for all such priority lists.Work as iterationses During equal to 1, only when recipient is located at the highest point of its priority list, this reception is scheduled just now.This situation can With worse.For example, each follow-up recipient k can have recipient k-1 (i.e. recipient 2 positioned at priority list top There is the recipient 1 being listed in top, recipient 3 has the recipient 2 being listed in top, etc.).In this case, only chain Road 1 can be scheduled, and it may be at all less than optimal.Second iteration can improve process, and wherein incompatible list is tested Measure and before recipient can jump to, but this process still apart from optimal spatial huge profit with far.
According to one embodiment of present invention, new program can be in last (nth iteration) quilt of bandwidth authorizing message Execution, rather than follow the tracks of same program in each iteration.Operation during j=1 ..., n-1 iteration and earlier paragraphs Described in identical.For last iteration, j=n, in a n-1 iteration, the institute of transmission bandwidth of having no chance mandate There is recipient can send exploration to authorize.If meeting SIR threshold for the signal of oneself at recipient, recipient UE can try Visit authorization channel.This interference is corresponding to being authorized to or be considered and other incompatible other high priority chains of bandwidth authorizing Road.In this example, sender can be configured to according to all bandwidth authorizing, be made whether the final decision sending.If Sender is thought incompatible by higher priority link, and it will not send.
Bandwidth authorizing can be transmitted under total power.If sender incompatible (i.e. with the reception with higher-priority There is between side the SIR less than selected threshold value), send under total power and provide in bandwidth authorizing message the incompatible of transmission List reaches the high probability of sender, and the incompatible list of transmission in bandwidth authorizing message is used for indicating that recipient turns off Sender.
With regard to authorization messages, as disclosed, there are a variety of modes to realize these enhancing message or mandate/refusal Message.For example, as it was previously stated, the enhancing of tone matrix (referring to Fig. 2) proposing in FlashLinQ or change can be used for offer and award Power and prevention instruction.Especially, in FlashLinQ, the periodicity pitch in authorization messages is uniquely mapped to link identification Accord with (ID), and these tones are according to priority arranged in domain logic.For each authorization messages, only correspond to mandate The tone of link has power.All other tone does not have power.On the contrary, at same group in an embodiment of mechanism and enhancement mechanism More information are carried in tone.Except transmit power in authorization link, authorize recipient also corresponding to meeting to authorizing chain Transmit power on the tone of link (link that for example interference assembly 408 identifies) that road causes strongly to disturb.Incompatible link Euphonic power show that those links are unavailable.Since authorization link is authorizing all unscheduled chain of recipient's perception There is in road highest priority, the tone of unavailable link is always below the tone of authorization link.Therefore, according to priority First group of tone in the tone matrix of classification is considered as to authorize tone, and the other group tones below priority are considered It is unavailable tone.
As it was previously stated, in nth iteration, souning out mandate and can be transferred to all not transmissions in a n-1 iteration The recipient of bandwidth authorizing.If recipient meets for the SIR threshold of oneself signal, then can transmit from recipient and authorize Signal is to sender.If sender is not thought incompatible by higher priority link, sender subsequently can award according to bandwidth Incompatible list in power can send determining it.
Corresponding to N number of bandwidth time slots, and compare with " god helps " scheduling as the theoretical upper limit, sound out the embodiment authorizing Simulated n=1,2,3 and 10 time iteration.According to definition, " refreshing " can make at all senders and recipient be in a network Each link is made refusal and is determined.Therefore, if link is denied to the recipient of higher priority, " refreshing " makes this decision It is all visible for UE all other in network.Correspondingly, only when the higher priority that link is abandoned is scheduled, chain Road can be abandoned.Using distributed mechanism, this can reach the upper limit of MPS process handling capacity.
In simulations, some parameters are chosen.Cellular deployment is simulated, has f interface of 1 row (21 cells), stands The distance between point is 500 meters.This deployment is wrapped (wrapped around) to obtain more accurate interference model.UE D2D Macrocell area is uniformly located to (pair).It is unified stochastic variable between 1 and 50 meter that UE adjusts the distance.When scheduled When, to using all available bandwidth, such as 50 Physical Resource Block (physical resources blocks, PRBs) come D2D Send data.LTE power control algorithm is used, and has the fractional coefficient of unity element (unity) and the mesh of 15 decibels (dB) Mark signal noise ratio (SNR).Channel model is didactic ITU-P14.11-6 channel model.
MPS process handling capacity be plotted as every cell equipment to equipment (D2D) to quantity gulp down with respect to MPS process The function of the amount of telling.During using souning out the method authorizing enhancing Fig. 4, as it was previously stated, result there occurs significant improvement.It is true that In most cases this result can reach within the 1% of the upper limit in only 2 iteration.For single iteration (n=1), performance Improve exciting.For substantial amounts of in each cell D2D UE couple, substantial amounts of iteration is needed to reach handling up close to the upper limit Amount.Iterationses n can be based on and select with respect to the desired handling capacity of the upper limit.
As shown in flow process Fig. 8, another example provides the user equipment (UE) being configured to that device-to-device (D2D) communicates Feature 800.This feature can be implemented as method or can be executed by the instruction on machine, and wherein these instructions are included extremely On a few computer-readable medium or on non-volatile machine readable storage medium storing program for executing.UE can have one or more processors, It is configured to receive the transmission request from sender UE at UE, as indicated at block 810.One or more processors can be from one Or multiple additional sender UE receives transmission request, as shown in block 820.Each transmission request may include and sends sending out of transmission request The priority level of the side of sending UE.In one embodiment, priority level can be chosen according to the demand of each UE, for example root According to the type of the information of service quality (QoS)/transmission, bandwidth of UE etc..Alternatively, priority can be selected at random, and And distribute to formed D2D couple each UE sender and UE recipient with UE neighbouring by D2D link communication.
The flow chart of Fig. 8 further includes that being directed to received transmission using one or more processors asks formation excellent First level list, such as block 830.One or more processors may recognize that the incompatible UE on priority list is not simultaneous to be formed Hold list, such as block 840.The priority level of incompatible UE is lower than the priority level sending UE, and the signal and between UE Interference is less than selected threshold value than (SIR).One or more processors can be configured in n-1 iteration, to sender UE and One or more additional sender UE transmission authorization messages and incompatible list.Alternatively, one or more processors can be joined Be set to according to receiving in UE, from the priority list of one or more additional sender UE and incompatible list, abandon from To the transmission of higher priority sender UE, wherein n is positive, nonzero integer to sender UE, as shown in block 850.One or many Individual processor can be configured to be sent to sender UE in n-th iteration by souning out bandwidth authorizing, heuristically to permit Permitted sender UE and sent D2D communication to UE in nth iteration in bandwidth authorizing, as shown in block 860.
In another example, the one or more processors of UE can be further configured to, as sender UE with than it Between the higher one or more additional sender UE of priority level incompatible when, sound out bandwidth authorizing in receive come spontaneous The D2D communication of the side of sending UE.One or more processors can be configured to, when sender UE and higher than its priority level and And when also not receiving incompatible between the one or more additional sender UE of authorization messages, receive souning out in bandwidth authorizing D2D communication from sender UE.
The one or more processors of UE can be configured to, when sender UE does not receive in n-1 iteration During bandwidth authorizing, communicate souning out the D2D receiving in bandwidth authorizing from sender UE.One or more processors can be further It is configured to send in total power level and sound out bandwidth authorizing.In one example, n can be configured so that 2 to provide bandwidth to award The iteration twice of power message.Alternatively, n can be set to the value of 1 or the value more than 2, and such as 3,4,5 etc. to value 20 or more Many.One or more processors can be configured to select the value of n to provide put down desired with respect to the upper limit for cell All cell transmission handling capacities.For example, the value of n can be chosen, and averagely gulps down in order to some the UE pair cells in each cell The amount of telling and such as god help the difference between the upper limit of the upper limit to be less than 5%, 4%, 3%, 2% or 1%.
In another example, distributed scheduling method 900 in device-to-device (D2D) network is in the flow process of Fig. 9 In figure explanation.The method includes receiving the operation of the transmission request from sender UE at recipient UE, as indicated by block 910. Transmission request can receive from one or more additional sender UE, as shown in block 920.Each transmission request may include transmission and passes The priority level of the sender UE of defeated request.The method further includes to form priority row using received transmission request Table, as shown in block 930.Create the incompatible list of incompatible UE on priority list, such as block 940.Incompatible UE has ratio and sends out The low priority level of the side's of sending UE priority level, and the signal-to-noise ratio (SIR) and recipient UE between is less than selected threshold Value.
Method 900 can further include, in n-1 iteration, transmission bandwidth authorization messages and incompatible list are to transmission Square UE and one or more additional sender UE, wherein n is positive nonzero integer, as shown in block 950.Alternatively, UE can be with base In receiving priority list and incompatible list from one or more additional sender UE in recipient UE, to abandon transmitting To higher priority UE, as shown in 960.In nth iteration, sound out bandwidth authorizing and can be transferred to sender from recipient UE UE, heuristically to allow sender UE to send D2D communication to recipient UE during nth iteration bandwidth authorizing, as 970 institutes Show.
Method 900 can further include, when sender UE and have than one of sender's UE higher priority grade or Between multiple additional sender UE incompatible when, sound out bandwidth authorizing in receive from sender UE D2D communication.Another Plant under operation, the method further includes, when sender UE awards with having than sender's UE higher priority grade and not receiving When weighing incompatible between the one or more additional sender UE of message, receive from sender UE's souning out in bandwidth authorizing D2D communicates.The method further includes, when sender UE does not also receive bandwidth authorizing in n-1 iteration, is souning out bandwidth D2D communication is received from sender UE in authorizing.
Method 900 can further include, total power level to sender UE send sound out bandwidth authorizing so that one or Multiple additional sender UE can receive exploration bandwidth authorizing.Bandwidth authorizing can send n-1 iteration, wherein n=2.Can Selection of land, the n of other values can also be chosen, and such as 1,2,3,4,5 etc., until 20 or more.In one embodiment, n Value can be chosen so as to provide the expectation average cell transmission handling capacity of the theoretical upper limit with respect to cell throughout for cell.
Another example provides non-volatile machine readable storage medium storing program for executing, has instruction 1000 thereon, and these instructions exist Following operation is realized by one or more processors when being executed, to provide the distributed scheduling in device-to-device (D2D) network, As shown in the flowchart of fig. 10.These operations include:Process the transmission receiving from sender UE to ask, such as at recipient UE Block 1010;Process the additional transmission request receiving from one or more additional sender UE, wherein each transmission request includes sending out Send the priority level of the sender UE of transmission request, such as block 1020;Form priority list using the transmission request being received, As block 1030;Create the incompatible list of incompatible UE on priority list, wherein incompatible UE has more preferential than sender UE The low priority level of level grade, and there is and recipient UE between the signal-to-noise ratio (SIR) less than selected threshold value, such as block 1040;For n-1 iteration, generate bandwidth authorizing message and incompatible list for transmission to sender UE and one or more attached Plus sender UE, wherein n is positive integer, such as block 1050;Or alternatively, send out from one or more adding based at recipient UE Priority list and incompatible list that the side of sending UE receives, determine that sender UE should abandon the transmission of higher priority UE, As block 1060;And generate in nth iteration and transmit to the exploration bandwidth authorizing of sender UE, heuristically to allow sender UE carries out D2D communication with recipient UE in the bandwidth authorizing of nth iteration, such as block 1070.
At least one non-volatile machine readable storage medium storing program for executing can further include to instruct, when it is by one or more process During device execution, including:When sender UE with there are the one or more additional senders higher than the priority level of sender UE When UE is incompatible, process the D2D communication from sender UE in souning out bandwidth authorizing;And/or as sender UE and more excellent than it First level higher grade and also one or more additional sender UE that do not receive authorization messages between incompatible when, souning out Process in bandwidth authorizing from the D2D communication sending UE.
At least one non-volatile machine readable storage medium storing program for executing can further include to instruct, when it is by one or more process During device execution, including:When sender UE does not receive bandwidth authorizing in n-1 iteration, sound out bandwidth authorizing in process from The D2D communication that sender UE receives;And/or indicate that will sound out bandwidth authorizing in total power level sends to transmission from recipient UE Square UE, so that one or more additional sender UE can receive exploration bandwidth authorizing.
At least one non-volatile machine readable storage medium storing program for executing can further include to instruct, when it is by one or more process During device execution, including:Setting bandwidth authorizing iterationses make its value of generation n=2;And/or select the value of n to provide phase to cell Expectation average cell transmission handling capacity for the cell throughout theory upper limit.
Figure 11 provides illustrating of wireless device, and such as user equipment (UE), movement station (MS), mobile wireless set Standby, mobile communication equipment, board, portable equipment or other types of wireless device.Wireless device may include one or many Individual antenna, is configured to and node, grand node, low power nodes (LPN), or transfer station, for example base station (BS), evolution Node B (eNB), Base Band Unit (BBU), long distance wireless head end (RRH), remote radio equipment (RRE), relay station (RS), wireless device Or other kinds of wireless wide area network (WWAN) access point is communicated (RE).Wireless device can be configured with least one Plant wireless communication standard communication, access (HSPA), bluetooth and WiFi including 3GPP LTE, WiMAX, high-speed packet.Wireless device Single antenna can be used for every kind of wireless communication standard, or for various wireless communication standard using shared antenna.No Line equipment can communicate in WLAN (WLAN), wireless personal area network (WPAN) and/or WWAN.
Figure 11 additionally provides mike and the explanation of one or more speaker, and it can be used for the audio input of wireless device And output.Display screen can be liquid crystal display (LCD) screen or other types of display screen, such as Organic Light Emitting Diode (OLED) show.Display screen can be configured to touch display screen.Touch display screen can be using electric capacity, resistance or other types Touch screen technology.Application processor and image processor can be coupled to internal storage to provide process and display capabilities. Nonvolatile memory port can be also used for providing a user with data input/output intent option.Nonvolatile memory port is also Can be used for the memory capabilities of extended wireless device.Keyboard can be integrated into wireless device or be connected wirelessly to wirelessly set Standby, to provide extra user input.Dummy keyboard can also be provided by using touch screen.
Various technology, or its specific aspect or part, can be with the program code (for example instructing) in tangible medium Form is realized, for example floppy diskette, CD-ROM, hard disk drive, non-transitory computer-readable storage media or other What computer-readable recording medium, wherein, when program code is written into and is executed by the machine of such as computer, this machine can Become the device realizing various technology.Circuit may include hardware, firmware, program code, executable code, computer instruction and/ Or software.Non-transitory computer-readable storage media can be not include the computer-readable recording medium of signal.Once journey Sequence code executes on programmable computers, and computing device may include the readable storage medium of processor, processor and (includes volatile Property, nonvolatile memory and/or memory element), at least one input equipment and at least one outut device.Volatibility, non- Volatile memory and/or memory element can be RAM, EPROM, flash drive, CD-ROM driver, disc driver, solid-state Driver or other medium for storage of electronic.Node and wireless device can also include transceiver module, enumerator Module, processing module and/or clock module or timer module.It is capable of or one using various technology described herein Or multiple program can using application programming interfaces (API), reusable control etc..Such program is implemented in advanced procedures To communicate with computer system in change or object-oriented programming language.However, program can collect or machine language is realized, if If necessary.Under any circumstance, language can be compiling or interpretative code, and and hardware realization combination.
It should be appreciated that a lot of functional units described in description have been marked as module, in order to more distinguishingly emphasize They realize independence.For example, module can be implemented as hardware circuit, including customization VLSI circuit OR gate array, ready-made Quasiconductor (such as logic chip, transistor or other detached assembly).Module equally can be realized by programmable hardware device, Such as field programmable gate array, programmable logic array, programmable logic device etc..
In one example, multiple hardware circuits can be used for realizing the functional unit described in description.For example, first is hard Part circuit can be used for execution and processes operation, and the second hardware circuit (such as transceiver) can be used for and other entity communications. First hardware circuit and the second hardware circuit can be incorporated into a hardware circuit, or alternatively, the first hardware circuit and second Hardware circuit can be separate hardware circuit.
Module is also implemented as the software of all kinds computing device.The mark module of executable code is permissible, For example, including the physically or logically block of one or more computer instructions, its can for example be organized into a target, program or Function.But, the execution of mark module needs not be and is physically located at one, can include being stored in the different of diverse location Instruction, when being joined logically together, it includes module and realizes the above-mentioned purpose of module.
In fact, the module of executable code can be single instruction, perhaps MIMD, or several differences can be distributed in Code segment in, between distinct program and cross over different memory equipment.Similarly, peration data herein can in module quilt Identify and illustrate, and can be implemented in any suitable form, and group in the data structure of any suitable type Knit.Peration data can be collected as single data set, or can be distributed in the diverse location including different storage device, and Electronic signal can be at least partially, merely as be present on system or network.Module can be passively or actively, including Operation and the agency executing desired function.
Mean that the special characteristic associating with example, structure or feature are included in this with regard to " example " in this specification In at least one bright embodiment.Therefore, the term " in one example " that in this specification, many places occur is not necessarily referring to same One embodiment.
As used herein, for facility, multiple projects, structural element, element and/or material can present In common list.However, these lists should be interpreted that each member of list is identified separately as independent and unique Member.Therefore, only because not being denoted as contradiction positioned at same group, the single member of this list should not be explained Real equivalent for any other member of unified list.In addition, various embodiments of the present invention and example can be counted as It is the selecting object of various assemblies.It should be appreciated that such embodiment, example and selection are not construed as each other in fact Equivalent, but should be considered as independence of the present invention and autonomous representative.
In addition, described feature, structure or characteristic can groups in one or more embodiments in any suitable manner Close.In the following description, there is provided a lot of details, such as layout, distance, network example etc., to provide for this The fully understanding of inventive embodiments.Those skilled in the relevant art will be it is realized that however, the present invention can be in neither one or many Individual detail, or have other methods, assembly, layout etc. to realize.In other examples it is known that structure, material or behaviour Do not display the details of and describe with each aspect of the present invention of avoiding confusion.
Although aforesaid example is explanation of the principles of the present invention under one or more application-specific, for those abilities It is clear that various forms can be carried out using the modification with implementation detail for field technique personnel, and do not need creative ability Training, the principle also without departing from the present invention and concept.Correspondingly, except claim defined below, the present invention is not limit Property processed.

Claims (21)

1. one kind is configured for the user equipment (UE) that device-to-device (D2D) communicates, and this UE has one or more process Device, is configured to:
The transmission request from sender UE is received at UE;
Receive the transmission request from one or more additional sender UE, wherein each transmission request includes sending transmission request Sender UE priority level;
Priority list is formed for received transmission request;
Identify incompatible UE on priority list to form incompatible list, wherein incompatible UE has than sender UE's The low priority level of priority level, and the signal-to-noise ratio (SIR) and between UE is less than selected threshold value;
Send authorization messages and incompatible row to sender UE and one or more of additional sender UE in n-1 iteration Table, or according to the priority list from one or more of additional sender UE receiving at UE and incompatible row Table, abandons the transmission from sender UE to higher priority UE, and wherein n is positive integer;And
Send to sender UE in nth iteration and sound out bandwidth authorizing, heuristically to allow sender UE to exist in nth iteration D2D communication is sent to UE in bandwidth authorizing.
2. UE as claimed in claim 1, wherein said one or more processors are configured to, as sender UE and When having incompatible between the one or more additional sender UE than sender's UE higher priority grade, award souning out bandwidth The D2D communication from sender UE is received in power.
3. UE as claimed in claim 1, wherein said one or more processors are configured to, as sender UE and Between one or more additional sender UE that is higher than its priority level and also not receiving authorization messages incompatible when, Communicate souning out the D2D receiving in bandwidth authorizing from sender UE.
4. UE as claimed in claim 1, wherein said one or more processors are configured to, when sender UE exists When not receiving bandwidth authorizing in n-1 iteration, communicate souning out the D2D receiving in bandwidth authorizing from sender UE.
5. UE as claimed in claim 1, wherein said one or more processors are configured to, in total power level Send and sound out bandwidth authorizing to sender UE.
6. UE as claimed in claim 1, wherein n=2.
7. UE as claimed in claim 1, wherein said one or more processors be configured to select n value come for Cell provides average cell transmission handling capacity desired with respect to the upper limit.
8. in a kind of device-to-device (D2D) network distributed scheduling method, the method includes:
The transmission request from sender UE is received at recipient UE;
Receive the transmission request from one or more additional sender UE, wherein each transmission request includes sending transmission request Sender UE priority level;
Form priority list using received transmission request;
Create the incompatible list of the incompatible UE on priority list, wherein incompatible UE has the priority than sender UE The low priority level of grade, and the signal-to-noise ratio (SIR) and between recipient UE is less than selected threshold value;
In n-1 iteration to sender UE and one or more of additional sender's UE transmission bandwidth authorization messages and and Hold list, wherein n is positive integer;Or
According to the priority list from one or more of additional sender UE and incompatible receiving at recipient UE List, abandons the transmission of higher priority UE;And
Send to sender UE in nth iteration and sound out bandwidth authorizing, heuristically to allow sender UE to exist in nth iteration D2D communication is sent to recipient UE in bandwidth authorizing.
9. method as claimed in claim 8, further includes:As sender UE and having than sender's UE higher priority etc. Between the one or more of additional sender UE of level incompatible when, receive from sender UE souning out in bandwidth authorizing D2D communicates.
10. method as claimed in claim 8, further includes:When sender UE and higher than its priority level and also When not receiving incompatible between the one or more additional sender UE of authorization messages, next spontaneous souning out reception in bandwidth authorizing The D2D communication of the side of sending UE.
11. methods as claimed in claim 8, further include:Award when sender UE does not receive bandwidth in n-1 iteration Temporary, receive the D2D communication from sender UE in exploration bandwidth authorizing.
12. methods as claimed in claim 8, further include:Send in total power level and sound out bandwidth authorizing to sender UE, so that one or more of additional sender UE can receive exploration bandwidth authorizing.
13. methods as claimed in claim 8, further include:Transmission bandwidth mandate in n-1 iteration, wherein n=2.
14. methods as claimed in claim 8, further include:The value selecting n to provide with respect to cell throughout for cell The desired average cell transmission handling capacity of the theoretical upper limit.
A kind of 15. non-transitory machinable mediums, have and are implemented in instruction therein, and these instructions are by one or more Following operation is realized during computing device, to provide the distributed scheduling in device-to-device (D2D) network, these operation bags Include:
Process the transmission receiving from sender UE to ask at recipient UE;
Process the additional transmission request receiving from one or more additional sender UE, wherein each transmission request includes sending and passes The priority level of the sender UE of defeated request;
Form priority list using the priority level in the transmission request being received;
Create the incompatible list of incompatible UE on priority list, wherein incompatible UE has than sender's UE priority level Low priority level, and the signal-to-noise ratio (SIR) and recipient UE between is less than selected threshold value;
For n-1 iteration, generate bandwidth authorizing message and incompatible list for transmission to sender UE and one or many Individual additional sender UE, wherein n is positive integer;Or
Based on priority list and the incompatible list from one or more of additional sender UE receptions at recipient UE, Determine that sender UE should abandon the transmission of higher priority UE;And
Generate in nth iteration and transmit to the exploration bandwidth authorizing of sender UE, heuristically to allow sender UE in n-th Iteration carries out D2D communication with recipient UE in bandwidth authorizing.
16. at least one non-transitory machinable medium as claimed in claim 15, further include to instruct, when it During by one or more of computing device, including:
When sender UE is not simultaneous with the one or more of additional sender UE with the priority level higher than sender UE Rong Shi, processes the D2D communication from sender UE in souning out bandwidth authorizing.
17. at least one non-transitory machinable medium as claimed in claim 15, further include to instruct, when it During by one or more of computing device, including:
As sender UE and one or more additional sender that is higher than its priority level and also not receiving authorization messages Between UE incompatible when, sound out bandwidth authorizing in process from sender UE receive D2D communication.
18. at least one non-transitory machinable medium as claimed in claim 15, further include to instruct, when it During by one or more of computing device, including:
When sender UE does not receive bandwidth authorizing in n-1 iteration, process in souning out bandwidth authorizing and connect from sender UE The D2D communication received.
19. at least one non-transitory machinable medium as claimed in claim 15, further include to instruct, when it During by one or more of computing device, including:
Instruction will be soundd out bandwidth authorizing in total power level and send to sender UE from recipient UE, so that one or more of Additional sender UE can receive exploration bandwidth authorizing.
20. at least one non-transitory machinable medium as claimed in claim 15, further include:
The bandwidth authorizing iterationses value that setting generates is n=2.
21. at least one non-transitory machinable medium as claimed in claim 15, further include:
The value selecting n to provide the expectation average cell transmission handling capacity with respect to the cell throughout theory upper limit to cell.
CN201580018692.5A 2014-05-08 2015-04-08 The exploration authorization of effective device-to-device communication Expired - Fee Related CN106465412B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201461990688P 2014-05-08 2014-05-08
US61/990,688 2014-05-08
US14/581,770 2014-12-23
US14/581,770 US9860909B2 (en) 2014-05-08 2014-12-23 Tentative grant for efficient device-to-device communications
PCT/US2015/024946 WO2015171245A1 (en) 2014-05-08 2015-04-08 Tentative grant for efficient device to device communications

Publications (2)

Publication Number Publication Date
CN106465412A true CN106465412A (en) 2017-02-22
CN106465412B CN106465412B (en) 2019-11-15

Family

ID=54369092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201580018692.5A Expired - Fee Related CN106465412B (en) 2014-05-08 2015-04-08 The exploration authorization of effective device-to-device communication

Country Status (6)

Country Link
US (1) US9860909B2 (en)
EP (1) EP3141069A4 (en)
JP (1) JP6367470B2 (en)
KR (1) KR101832655B1 (en)
CN (1) CN106465412B (en)
WO (1) WO2015171245A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9661652B2 (en) * 2014-01-30 2017-05-23 Intel IP Corporation Efficient receiver yielding for distributed D2D communications
US9860909B2 (en) 2014-05-08 2018-01-02 Intel IP Corporation Tentative grant for efficient device-to-device communications
KR102311755B1 (en) * 2014-08-06 2021-10-14 인터디지탈 패튼 홀딩스, 인크 Device-to-device(d2d) pre-emption and access control
WO2017099839A1 (en) * 2015-12-10 2017-06-15 Intel IP Corporation Bandwidth overhead reduction for proximity device communications
US10383137B2 (en) * 2016-07-28 2019-08-13 Qualcomm Incorporated Mechanisms for signaling out-of-coverage sidelink devices in wireless communication
WO2018122571A1 (en) * 2016-12-28 2018-07-05 Intel IP Corporation Communication terminal and method for initiating a communication
EP3571804B1 (en) * 2017-02-21 2021-08-25 Huawei Technologies Co., Ltd. Method and apparatus for managing communication links with a plurality of traffic nodes

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130012221A1 (en) * 2010-01-19 2013-01-10 Nokia Corporation Evolved node b controlled centralized resource reuse for device-to-device and cellular users
WO2013032251A2 (en) * 2011-08-30 2013-03-07 엘지전자 주식회사 Method for supporting device-to-device communication in a cellular network, and apparatus for same
WO2014063094A1 (en) * 2012-10-19 2014-04-24 Qualcomm Incorporated Priority assignment in flashlinq distributed scheduling algorithm to fine-tune performance

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9614641B2 (en) * 2010-05-12 2017-04-04 Qualcomm Incorporated Resource coordination for peer-to-peer groups through distributed negotiation
US9049694B2 (en) * 2011-10-03 2015-06-02 Qualcomm Incorporated Methods and apparatus for distributed medium access in wireless peer-to-peer networks
KR101815326B1 (en) 2012-01-31 2018-01-04 삼성전자주식회사 Apparatus and method for providing target service based on d2d
WO2013191360A1 (en) 2012-06-20 2013-12-27 엘지전자 주식회사 Signal transmission/reception method and apparatus therefor
KR20140023738A (en) * 2012-08-17 2014-02-27 삼성전자주식회사 Method and apparatus for link scheduling based on a sharing interference information between links in wireless communication system
US9860909B2 (en) 2014-05-08 2018-01-02 Intel IP Corporation Tentative grant for efficient device-to-device communications

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130012221A1 (en) * 2010-01-19 2013-01-10 Nokia Corporation Evolved node b controlled centralized resource reuse for device-to-device and cellular users
WO2013032251A2 (en) * 2011-08-30 2013-03-07 엘지전자 주식회사 Method for supporting device-to-device communication in a cellular network, and apparatus for same
WO2014063094A1 (en) * 2012-10-19 2014-04-24 Qualcomm Incorporated Priority assignment in flashlinq distributed scheduling algorithm to fine-tune performance

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
XINZHOU WU: "FlashLinQ: A Synchronous Distributed Scheduler", 《 2010 48TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING 》 *

Also Published As

Publication number Publication date
JP6367470B2 (en) 2018-08-01
US20150327296A1 (en) 2015-11-12
WO2015171245A1 (en) 2015-11-12
KR20160131067A (en) 2016-11-15
KR101832655B1 (en) 2018-02-26
JP2017518003A (en) 2017-06-29
EP3141069A1 (en) 2017-03-15
US9860909B2 (en) 2018-01-02
EP3141069A4 (en) 2017-12-20
CN106465412B (en) 2019-11-15

Similar Documents

Publication Publication Date Title
CN106465412B (en) The exploration authorization of effective device-to-device communication
CN105103519B (en) For mitigating system, the method and apparatus of the distributed scheduling of interference of the equipment to equipment
EP3064016B1 (en) Systems, methods, and devices for efficient device-to-device channel contention
CN105103470B (en) The method and apparatus of multiple cell equipment discovery for device-to-device communication
CN106233800B (en) Device-to-device communication device and method
WO2016188250A1 (en) Resource allocation method and apparatus
US20200396040A1 (en) Efficient sidelink harq feedback transmission
TW202005454A (en) Supporting scheduling plan indications
CN106060947A (en) Resource distribution method and system in wireless mobile communication
CN108112087A (en) A kind of V2X network resource informations indicating means and base station
CN112889323A (en) Method and system for autonomous direct link resource allocation
CN109479204A (en) Semi-persistent measuring reference signals (MRS) configuration
CN104885396A (en) A network node, a wireless device and methods therein for enabling and performing harq transmissions in a d2d communication between wireless devices in a wireless telecommunications network
CN103875294A (en) Resource reconfiguration for up-link transmission
CN105103637B (en) Equipment communication means and device
US20140362795A1 (en) Method of retransmitting data in a wireless connection system supporting machine-to-machine communication, and device for supporting same
CN110169137A (en) System and method for delivery of system information
JP2016538741A (en) Method and system for distributed coordination
WO2016054933A1 (en) Device to device interference coordination method, device, base station and user equipment
CN107231702A (en) The method for building up of direct connected link and its method and node for realizing data transfer
CN106851712A (en) A kind of method of Message Processing, base station and terminal
WO2015062653A1 (en) Broadcast channel management
CN105594283B (en) Data transmission link establishes device, method and communication system
CN106612554A (en) Time domain resource distribution method, base station and user equipment (UE)
CN105578494A (en) Device-to-device interference coordination method, device, base station, a user equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1233817

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200331

Address after: California, USA

Patentee after: INTEL Corp.

Address before: California, USA

Patentee before: INTEL IP Corp.

Effective date of registration: 20200331

Address after: California, USA

Patentee after: Apple Inc.

Address before: California, USA

Patentee before: INTEL Corp.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191115

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1233817

Country of ref document: HK